Title :
Modeling Peer-to-Peer Botnets
Author :
van Ruitenbeek, E. ; Sanders, William H.
Author_Institution :
Electr. & Comput. Eng. Dept., Univ. of Illinois at Urbana-Champaign, Urbana, IL
Abstract :
Peer-to-peer botnets are a relatively new yet rapidly growing Internet threat. In the year since its introduction in January 2007, the Storm Worm peer-to-peer botnet has become the largest botnet on the Internet. Unlike previous botnets operating over IRC channels, the Storm Worm botnet uses a decentralized peer-to-peer network to communicate among the bots and to control their computing power. While a centralized control structure can be toppled relatively easily by finding and disconnecting the head, a decentralized control structure is much harder to dismantle. Given this reality, security researchers must find new ways to defend against peer-to-peer botnets. Toward that aim, we have developed a stochastic model of peer-to-peer botnet formation to provide insight on possible defense tactics. We use the stochastic model to examine how different factors impact the growth of the botnet. Simulation results from the model evaluate the effectiveness both of prevention measures and of detection and disinfection methods. In this way, the simulation results from our peer-to-peer botnet model provide guidance for the design of future anti-malware systems.
Keywords :
peer-to-peer computing; security of data; Internet threat; Peer-To-Peer Botnets Modeling; Storm Worm peer-to-peer botnet; antimalware systems; decentralized control structure; decentralized peer-to-peer network; defense tactics; stochastic model; Centralized control; Computer crime; Computer worms; Distributed computing; Distributed control; Internet; Magnetic heads; Peer to peer computing; Stochastic processes; Storms; botnet; modeling; peer-to-peer; simulation;
Conference_Titel :
Quantitative Evaluation of Systems, 2008. QEST '08. Fifth International Conference on
Conference_Location :
St. Malo
Print_ISBN :
978-0-7695-3360-5
DOI :
10.1109/QEST.2008.43